Klm-based Profiling and Preventing Security Attacks for Cloud Computing: A Comparative Study.
Nahid EddermougAbdeljebar MansourMohamed SadikEssaid SabirMohamed AzmiPublished in: ICT (2021)
Keyphrases
- cloud computing
- security issues
- security mechanisms
- cloud computing environment
- cloud storage
- data privacy
- computer security
- computing resources
- trusted computing
- network access
- identity management
- security protocols
- big data
- data center
- data management
- computing infrastructure
- information security
- service providers
- distributed computing
- cloud services
- computing technologies
- intrusion detection
- access control
- network security
- business models
- cloud computing platform
- security analysis
- database systems
- security policies
- virtual machine
- load balance
- private cloud